On 07/18/2012 12:06 PM, Sam Varshavchik wrote: > Andrew Haley writes: > >> On 07/18/2012 02:25 AM, Sam Varshavchik wrote: >>> >> Not exactly. You said: >> >>> Can you explain, then, the "correctly" approach by which an >>> executable can affirm whether another pid is either running the same >>> executable, or the post-prelinked version of the same >>> executable. Anyone who suggests readlinking /proc/self/exe, then >>> the other /proc/pid/exe, and comparing them sans any hardcoded " >>> (deleted)" suffix is going to get only howls of laughter, in >>> response. >> >> But that's not a use case. There's no way to know why you want to do >> this: why you care that another process is running the exact same >> executable. > > Because that's the only process I want to talk to. A form of authentication, > which I already explained. More than once. You have _claimed_ that it's a form of authentication, but you've produced no reason to believe that it is. How do you know that the exact same binary isn't running as some rogue user, with other data injected into it? > And we've been over this. Yes we have. You've made claims, none of which you've justified. Or you may have done but I missed them. But as it stands this is an utterly hopeless way to authenticate anything. Andrew. -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel